Index

Red vs Blue

Insider Notes

Noodlophile Malware Campaign Expands Global Reach with ...

The threat actors behind the Noodlophile malware are leveraging spear-phishing e...

Hackers breach and expose a major North Korean spying o...

Two hackers broke into the computer of a North Korean government hacker and leak...

When Employees Become the Weakest Link: Lessons from In...

Not all cybersecurity threats come from outside attackers. Insider threats, whet...

Policy & Privacy

Latest Posts

View All Posts
Malware Alley

QuirkyLoader: The Malware Delivery Engine You Need to W...

QuirkyLoader is the latest malware loader distributing RATs and keyloggers.

Policy & Privacy

How your solar rooftop became a national security issue

Texas solar company EG4 became the poster child for home energy cybersecurity ri...

Cyber News Feed

HR giant Workday says hackers stole personal data in re...

The HR tech giant said it had no indication of any unauthorized access to custom...

Policy & Privacy

Allianz Life data breach affects 1.1 million customers

Data breach notification site Have I Been Pwned notified 1.1 million customers o...

Cyber News Feed

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full...

Cybersecurity researchers have detailed the inner workings of an Android banking...

Policy & Privacy

Wazuh for Regulatory Compliance

Organizations handling various forms of sensitive data or personally identifiabl...

Cyber News Feed

Malicious PyPI and npm Packages Discovered Exploiting D...

Cybersecurity researchers have discovered a malicious package in the Python Pack...

Red vs Blue

NFC Fraud, Curly COMrades, N-able Exploits, Docker Back...

Power doesn’t just disappear in one big breach. It slips away in the small stuff...

Cyber News Feed

Microsoft Windows Vulnerability Exploited to Deploy Pip...

Cybersecurity researchers have lifted the lid on the threat actors' exploitation...

Insider Notes

Noodlophile Malware Campaign Expands Global Reach with ...

The threat actors behind the Noodlophile malware are leveraging spear-phishing e...

Red vs Blue

Mobile Phishers Target Brokerage Accounts in ‘Ramp and ...

Cybercriminal groups peddling sophisticated phishing kits that convert stolen ca...